How to prevent the top five most common Web app flaws

Web Application Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Web application firewalls: A technical guide

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web application firewalls in which experts examine evaluation ... 

  • Negative exposure: Web scanners reveal unknown holes

    Enterprises increasingly need reliable technology to scan Web applications for vulnerabilities. But can organizations count on today's technology? This issue examines 2003's top Web application scanning products. Also in this issue: tools that make s... 

  • Web Application Security

    This series looks at Web application threats, secure software development practices and the challenge of finding and fixing Web application vulnerabilities. 

  • Readers' Choice Awards 2011

    Readers vote on the best Web security products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention. 

  • Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads. 

  • Web application attacks security guide: Preventing attacks and flaws

    This Web application attacks guide explains how Web application attacks occur, identifies Web application attack types, and provides Web application security tools and tactics to protect against them. 

  • Locking down your Web applications

    In this primer, learn how dynamically created Web server content can present a risk to the server itself, and how good processes can improve the Web server security life cycle. 

  • Quiz: Could you detect an application attack?

    Take this five-question quiz to test your application security awareness, review common application attacks and learn how to improve application layer logging to detect and protect against these attacks. 

  • State-based attacks: Session management

    In this excerpt from Chapter 4 of "How to Break Web Software: Functional and Security Testing of Web Applications and Web Services," authors Mike Andrews and James A. Whittaker identify session management techniques Web developers should use to prote... 

  • Content Spoofing

    This excerpt from "Preventing Web Attacks with Apache" explains how content spoofing attacks exploit vulnerabilities and how to use Apache to protect against them. 

  • Quiz: Web application threats and vulnerabilities

    This quiz will help you determine how knowledgeable you are about securing your Web apps and whether you need to hone your Web security skills. 

  • Gaining access using application and operating system attacks

    In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their advanta... 

  • See more Essential Knowledge on Web Application Security
  • distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 

  • Apache HTTP server project

    The Apache HTTP server project is a collaborative open source Web server development initiative. The project is spearheaded by the Apache Server Foundation. 

  • Web application (Web app)

    A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface. 

  • pen test (penetration testing)

    Penetration testing (also called pen testing) is a tool for testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. (Continued) 

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensit... 

  • JavaScript hijacking

    JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML)... (Continued) 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. 

  • cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft. 

  • cache cramming

    Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run. 

  • LUHN formula (modulus 10)

    The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card. 

  • See more Definitions on Web Application Security
About Web Application Security

Browse this section for the latest news, expert advice and learning tools on Web application security, including common threats and methods for protecting against them, Web application testing, assessment and firewalls including how to deploy a firewall.